Policy 8-2-3: Network Policy
|Policy:||Policy 8-2-3: Network Policy||Date Adopted:||Feb 20, 2007|
Table of Contents:
- Use of the Network
- Wired Networks
- Wireless Network
- Security of the WNC network
Section 1: Use of the Network
- The network installed in Western Nevada College is used to transmit digital, telephonic
(VOIP), and video data to and through all campus locations. The WNC data networks
are connected through a Wide Area Network called the NevadaNet. The information on
the operation and control of the NevadaNet is contained in the following policies
NevadaNet Appropriate Use Policy http://www.unr.edu/it/about-us/policies
NevadaNet Connection Policy http://www.unr.edu/it/about-us/policies
- The initial point of contact for problems related to the NevadaNet is WNC Computing Services.
- Network connectivity via an installed data drop is authorized for college-owned equipment only. A new data drop or a change to an existing connection on the wired infrastructure will be coordinated through Computing Services.
Section 2: Wired Networks
- Production Network
- This network is used to connect devices used by staff, faculty and students, i.e., workstations, file servers, printers and support devices together, for use on a common college network. Network connectivity via an installed data drop is authorized only for college-owned equipment.
- Facilities Network
- It is designed to connect HVAC, security, and video devices onto a private network. This network is not designed to share data with the production network.
Section 3: Wireless Network
- WiFi is not intended to be a direct replacement for the wired infrastructure
- WiFi is installed for use by WNC students, sponsored guests after they have submitted a wireless access form, and WNC faculty and staff. WiFi provides access to the Internet only and will not provide a direct access to the services contained on other college networks.
- Locations within WNC that use the wireless technology are:
- Hightech Center (Carson)
Section 4: Security of the WNC network
- All network devices and support hardware must be protected from public access by a physical barrier. A locked door, fencing or locked cabinet will serve as an acceptable physical barrier.
- Access to all devices on the network require authentication, i.e., name and password. The exceptions to this are printers and peripheral devices that contain no data, i.e., door control card access readers.
- Access control
- Access to the network infrastructure is controlled physically and digitally by Computing Services.
|Date(s) Revised||November 1, 2016; September 2, 2008;||Date(s) Reviewed|